General

  • Target

    3020-83-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    8de79dc0a2e7ed8d683e3afebfa7bf46

  • SHA1

    13e453bcd802c010e0b5f64087d40cc459960700

  • SHA256

    f8c8b90402e64351595888e9ea86b5197023b50fe1e544e0eae1ceac47313b4b

  • SHA512

    50802733c26e73a13c5228f81c81202ff5902950c6b3ef32a34ad240635b6b7c895140fb7b51db094bcd2edebfee5fd32686a4b3fc3882b6985a2714c9113040

  • SSDEEP

    3072:pN9zgaHeuGhriktrBxN3kuZ+zdzK8e8hj:/9Ie4rhTodzK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3020-83-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections